2018
DOI: 10.1049/iet-ipr.2018.5661
|View full text |Cite
|
Sign up to set email alerts
|

Robust image hashing using exact Gaussian–Hermite moments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 25 publications
0
7
0
Order By: Relevance
“…In addition to the above schemes, researchers have successively proposed other types of hash algorithms. For instance, based on feature points [16]- [19] and image moments [17], [20], [21], and [22]. Ling et al [16] proposed to use Multi-Scale Invariant Feature Transform descriptors to construct hash sequences, and to improve the discriminating performance of local regions by extracting SIFT feature descriptors with different radii from certain regions.…”
Section: Other Image Hashing Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…In addition to the above schemes, researchers have successively proposed other types of hash algorithms. For instance, based on feature points [16]- [19] and image moments [17], [20], [21], and [22]. Ling et al [16] proposed to use Multi-Scale Invariant Feature Transform descriptors to construct hash sequences, and to improve the discriminating performance of local regions by extracting SIFT feature descriptors with different radii from certain regions.…”
Section: Other Image Hashing Methodsmentioning
confidence: 99%
“…Karsh et al [19] generated image hash based on equal area ring splitting and invariant vector distance combined with corner inclusion of image luminance components. Khalid et al [20] generated robust hash by extracting Gaussian-Hermite moments and invariants of Gaussian-Hermite moments of grayscale images. The algorithm performs well, especially in terms of robustness to noise attacks.…”
Section: Other Image Hashing Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Hosny et al [14] proposed a hashing scheme based on quaternion polar complex exponential transform, which has good robustness and image authentication ability. Hosny et al [15] proposed a hashing scheme based on Gaussian-Hermite moments. And this algorithm has robustness not only to some common noises, but also to rotation attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Huang et al [26] extracted the statistical features of the texture image such as contrast, correlation, gradient, and homogeneity as the global features of the image, and combined them with the DCT transform to construct the image hash. Hosny et al [27] extracted Gaussian-Hermite moments and variance of grayscale images as image features. Wang et al [28] designed hash sequences by combining the Watson visual model, Zernike moments and DCT coefficients.…”
Section: Based On Statistical Characteristicsmentioning
confidence: 99%